Have a personal or library account? Click to login
Redundancy–Based Intrusion Tolerance Approaches Moving from Classical Fault Tolerance Methods Cover

Redundancy–Based Intrusion Tolerance Approaches Moving from Classical Fault Tolerance Methods

Open Access
|Dec 2022

References

  1. Alladi, T., Chamola, V. and Zeadally, S. (2020). Industrial control systems: Cyberattack trends and countermeasures, Computer Communications 155: 1–8.10.1016/j.comcom.2020.03.007
  2. Archer, D.W., Bogdanov, D., Lindell, Y., Kamm, L., Nielsen, K., Pagter, J.I., Smart, N.P. and Wright, R.N. (2018). From keys to databases—Real-world applications of secure multi-party computation, The Computer Journal 61(12): 1749–1771.10.1093/comjnl/bxy090
  3. Avizienis, A. (1985). The N-version approach to fault-tolerant software, IEEE Transactions on Software Engineering SE-11(12): 1491–1501.10.1109/TSE.1985.231893
  4. Avizienis, A., Laprie, J.-C., Randell, B. and Landwehr, C. (2004). Basic concepts and taxonomy of dependable and secure computing, IEEE Transactions on Dependable and Secure Computing 1(1): 11–33.10.1109/TDSC.2004.2
  5. Babay, A., Tantillo, T., Aron, T., Platania, M. and Amir, Y. (2018). Network-attack-resilient intrusion-tolerant SCADA for the power grid, 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), Luxemburg, Luxemburg, pp. 255–266.
  6. Bondavalli, A., Di Giandomenico, F. and Xu, J. (1993). A cost-effective and flexible scheme for software fault tolerance, Computer Systems: Science & Engineering 8(4): 234–244.
  7. Di Giandomenico, F. and Masetti, G. (2021). Basic aspects in redundancy-based intrusion tolerance, 14th International Conference on Computational Intelligence in Security for Information Systems/12th International Conference on European Transnational Educational, Bilbao, Spain, pp. 192–202.
  8. Di Giandomenico, F. and Strigini, L. (1990). Adjudicators for diverse-redundant components, Proceedings of the 9th Symposium on Reliable Distributed Systems, Huntsville, USA, pp. 114–123.
  9. Distler, T. (2022). Byzantine fault-tolerant state-machine replication from a system’s perspective, ACM Computing Surveys 54(1): 1–38.10.1145/3436728
  10. Dohi, T., Trivedi, K. S. and Avritzer, A. (2020). Hand-book of Software Aging and Rejuvenation: Fundamentals, Methods, Applications, and Future Directions, WSPC, Singapore.10.1142/11673
  11. Garcia, M., Bessani, A., Gashi, I., Neves, N. and Obelheiro, R. (2014). Analysis of operating system diversity for intrusion tolerance, Software—Practice & Experience 44(6): 735–770.10.1002/spe.2180
  12. Gashi, I., Povyakalo, A. and Strigini, L. (2016). Diversity, safety and security in embedded systems: Modelling adversary effort and supply chain risks, 12th European Dependable Computing Conference (EDCC), Gothenburg, Sweden, pp. 13–24.
  13. Gorbenko, A., Romanovsky, A., Tarasyuk, O. and Biloborodov, O. (2020). From analyzing operating system vulnerabilities to designing multiversion intrusion-tolerant architectures, IEEE Transactions on Reliability 69(1): 22–39.10.1109/TR.2019.2897248
  14. Haphuriwat, N. and Bier, V.M. (2011). Trade-offs between target hardening and overarching protection, European Journal of Operational Research 213(1): 320–328.10.1016/j.ejor.2011.03.035
  15. Hardekopf, B., Kwiat, K. and Upadhyaya, S. (2001). Secure and fault-tolerant voting in distributed systems, IEEE Aerospace Conference Proceedings, Gothenburg, Sweden, pp. 1117–1126.
  16. Khan, M. and Babay, A. (2021). Toward intrusion tolerance as a service: Confidentiality in partially cloud-based BFT systems, 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN21), Taipei, Taiwan, pp. 14–25.
  17. Khraisat, A., Gondal, I., Vamplew, P. and Kamruzzaman, J. (2019). Survey of intrusion detection systems: Techniques, datasets and challenges, Cybersecurity 2(1): 1–20.10.1186/s42400-019-0038-7
  18. Laprie, J.-C., Arlat, J., Beounes, C. and Kanoun, K. (1990). Definition and analysis of hardware-and software-fault-tolerant architectures, Computer 23(7): 39–51.10.1109/2.56851
  19. Littlewood, B. and Strigini, L. (2000). A discussion of practices for enhancing diversity in software designs, Technical Report DISPO LS DI TR-04 V1 1d, Centre for Software Reliability, City University, London, https://openaccess.city.ac.uk/id/eprint/275/.
  20. Lyu, M.R. (1995). Software Fault Tolerance, John Wiley & Sons Ltd, Hoboken.
  21. Majdzik, P. (2022). A feasible schedule for parallel assembly tasks in flexible manufacturing systems, International Journal of Applied Mathematics and Computer Science 32(1): 51–63, DOI: 10.34768/amcs-2022-0005.
  22. Mejdi, S., Messaoud, A. and Ben Abdennour, R. (2020). Fault tolerant multicontrollers for nonlinear systems: A real validation on a chemical process, International Journal of Applied Mathematics and Computer Science 30(1): 61–74, DOI: 10.34768/amcs-2020-0005.
  23. Nascimento, A.S., Rubira, C.M.F., Burrows, R. and Castor, F. (2013). A systematic review of design diversity-based solutions for fault-tolerant SOAs, Proceedings of the 17th International Conference on Evaluation and Assessment in Software Engineering, EASE’13, Porto de Galinhas, Brazil, pp. 107–118.
  24. Obelheiro, R., Bessani, A., Lung, L. and Correia, M. (2006). How practical are intrusion-tolerant distributed systems?, Technical Report DI-FCUL TR 06–15, Department of Informatics, University of Lisbon, Lisbon, https://repositorio.ul.pt/handle/10451/14093.
  25. Puig, V., Sauter, D., Aubrun, C. and Schulte, H. (Eds) (2018). Advanced Diagnosis and Fault-Tolerant Control Methods (special section), International Journal of Applied Mathematics and Computer Science 28(2): 233–333.
  26. Pullum, L.L. (2001). Software Fault Tolerance Techniques and Implementation, Artech House, Inc., Canton St. Norwood.
  27. Qiu, J., Tian, Z., Du, C., Zuo, Q., Su, S. and Fang, B. (2020). A survey on access control in the age of Internet of Things, IEEE Internet of Things Journal 7(6): 4682–4696.10.1109/JIOT.2020.2969326
  28. Randell, B. (1975). System structure for software fault tolerance, IEEE Transactions on Software Engineering SE-1(2): 220–232.10.1109/TSE.1975.6312842
  29. Randell, B. and Xu, J. (1994). The evolution of the recovery block concept, in M. Lyu (Ed), Software Fault Tolerance, Vol. 3, Wiley, Chichester, pp. 1–22.
  30. Rodriguez, M., Kwiat, K.A. and Kamhoua, C.A. (2015). Modeling fault tolerant architectures with design diversity for secure systems, IEEE Military Communications Conference (MILCOM), Tampa, USA, pp. 1254–1263.
  31. Saidane, A., Nicomette, V. and Deswarte, Y. (2009). The design of a generic intrusion-tolerant architecture for web servers, IEEE Transactions on Dependable and Secure Computing 6(1): 45–58.10.1109/TDSC.2008.1
  32. Scarfone, K. and Mell, P. (2010). Intrusion detection and prevention systems, in P. Stavroulakis and M. Stamp (Eds), Handbook of Information and Communication Security, Springer, Berlin/Heidelberg, pp. 177–192.10.1007/978-3-642-04117-4_9
  33. Scott, R., Gault, J. and McAllister, D. (1985). The consensus recovery block, Total System Reliability Symposium, Gaithersburg, USA, pp. 74–85.
  34. Sousa, P., Bessani, A. and Obelheiro, R. (2008). The forever service for fault/intrusion removal, Proceedings of the 2nd Workshop on Recent Advances on Intrusion-Tolerant Systems, Glasgow, UK,p.16.
  35. Tarraf, D.C., Kamhoua, C.A., Kwiat, K.A. and Njilla, L. (2017). Majority is not always supreme: Less can be more when voting with compromised nodes, IEEE 18th International Symposium on High Assurance Systems Engineering (HASE), Singapore, Singapore, pp. 9–12.
  36. Veríssimo, P.E., Neves, N.F. and Correia, M.P. (2003). Intrusion-tolerant architectures: Concepts and design, in R. Lemos et al. (Eds), Architecting Dependable Systems, Springer, Berlin, pp. 3–36.10.1007/3-540-45177-3_1
  37. Vöelp, M. and Verissimo, P. (2018). Intrusion-tolerant autonomous driving, IEEE 21st International Symposium on Real-Time Distributed Computing (ISORC), Singapore, Singapore, pp. 130–133.
  38. Wang, L., Ren, S., Korel, B., Kwiat, K.A. and Salerno, E. (2014). Improving system reliability against rational attacks under given resources, IEEE Transactions on Systems, Man, and Cybernetics: Systems 44(4): 446–456.10.1109/TSMC.2013.2263126
  39. Ylmaz, E.N. and Gänen, S. (2018). Attack detection/prevention system against cyber attack in industrial control systems, Computers & Security 77: 94–105.10.1016/j.cose.2018.04.004
  40. Zhang, F., Kodituwakku, H.A.D.E., Hines, J.W. and Coble, J. (2019). Multilayer data-driven cyber-attack detection system for industrial control systems based on network, system, and process data, IEEE Transactions on Industrial Informatics 15(7): 4362–4369.10.1109/TII.2019.2891261
  41. Zhou, Y., Han, M., Liu, L., He, J.S. and Wang, Y. (2018). Deep learning approach for cyberattack detection, IEEE INFOCOM 2018—IEEE Conference on Computer Communications Workshops, Honolulu, USA, pp. 262–267.
DOI: https://doi.org/10.34768/amcs-2022-0048 | Journal eISSN: 2083-8492 | Journal ISSN: 1641-876X
Language: English
Page range: 701 - 719
Submitted on: Dec 30, 2021
Accepted on: Jun 30, 2022
Published on: Dec 30, 2022
Published by: University of Zielona Góra
In partnership with: Paradigm Publishing Services
Publication frequency: 4 issues per year

© 2022 Felicita Di Giandomenico, Giulio Masetti, Silvano Chiaradonna, published by University of Zielona Góra
This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 3.0 License.